Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe
Resource
win10v2004-20240802-en
General
-
Target
b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe
-
Size
14.0MB
-
MD5
6f8c143000dc692a2328e41ba6d62326
-
SHA1
4b93f517528b8bc415780e98de7b6dbe8e2eb61e
-
SHA256
b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b
-
SHA512
7b17ca65744d0e7de7bb4df23e254463c688d905e3e02b531891b5383c14482cad4a7efe9112a70240531baf27a40eecb818861bebcac5bd7b0ca2c33592fc99
-
SSDEEP
393216:LmyykPBCLxAxjhX2VZqxxran99FpjA9E4d:Lt5GxAZhmv8rOJjCtd
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\360Safe = "C:\\Users\\Public\\360Safe.exe" b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5100 b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe 5100 b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe 5100 b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe 5100 b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3428 Explorer.EXE -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3428 5100 b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe"C:\Users\Admin\AppData\Local\Temp\b09a8639b204d9529a6630b05962c7d4fb713d2fed400f6c963875cb61da025b.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100
-